Upload
others
View
5
Download
0
Embed Size (px)
Citation preview
PROJECT TITLES FOR ACADEMIC YEAR 2017 – 2018
For: - B. E | B. Tech | M. E | M. Tech | MCA | BCA | Diploma |MS |M. Sc |
IEEE REAL TIME PROJECTS& TRAINING GUIDE
SOFTWARE & EMBEDDED
#19, MN Complex, 2nd Cross, Sampige Main Road, Malleswaram, Bangalore – 560003
Call Us: 7019280372/9590544567 / 9739066172, www.makefinalyearproject.com
www.igeekstechnologies.com Land Mark: Opposite Joyalukkas Gold Showroom, Near to Mantri Mall
www.makefinalyearproject.com
HPE COC TRAINING CENTER
HPE COC TRAINING PROGRAMMS:
IGEEKS, providing quality, industry oriented programs are at forefront of our motto. Our training programs are among the most sought after
by the industry which is offered to both experienced and fresher’s alike. We strive to bring the latest and advanced courses to our students
in order to equip them with the most sought after skill-sets required by the industry. In our quest for offering quality, industry ready skills
for our students, we are proud to announce that we are now an Authorized delivery partner for Hewlett Packard Enterprise (HPE). With us
collaborating with our esteemed partner HPE, we now offer top of the class, industry oriented and HPE certified courses to our students to
make them industry ready on completion of a course from a wide variety of HPE certified programs. These courses are available to fresh
graduates as well as experienced candidates.
Here's a cursory glance at some of the courses offered by HPE across key Indian cities - Programming Techniques using 'C', PHP, VLSI, VHDL
& PCB Design, Data Structure using C Language, Core Java, J2EE - Hibernate with Spring Framework, J2EE - Struts with Hibernate Framework,
Android, ASP.NET With C#, Embedded & Robotics-Basics & Advanced, ARM, Linux Administration with Scripting, Networking concepts with
security.
The advantages of our HPE certified programs are: Programs delivered by certified professionals by HPE.
Certification directly by HPE is globally recognized with no refreshing period.
Curriculum designed by industry experts from HPE. Thereby providing training in latest technologies.
Adds significant weight age to a candidates' profile, enhancing their career prospects.
Every student would be given HPE courseware, notepad and pen along with an online examination voucher.
Certificate would be issued after he/she successfully completes the assessment exam.
If you require any further information regarding the courses, feel free to contact US: Malleswaram/JayaNagar-9739066172.
Be HPE Certified
Android Asp.net With C#
Big Data-Programming&Development Core Java
Core Java with Android
Embedded & Robotics Basics and Advanced
J2EE-Struts with Hibernate Framework
PHP with WordPress
Programming Techniques Using C and C++ VLSI VHDL & PCB Design
S.No PROJECT TITLES (2017-2018) Year
MCA PROJECT TITLES
IMAGE PROCESSING
1 Automatic Generation of Social Event Storyboard from Image Click-through Data IEEE 2017
2 Image Re-ranking based on Topic Diversity IEEE 2017
3 Tri-Clustered Tensor Completion for Social-Aware Image Tag Refinement IEEE 2017
4 A Locality Sensitive Low-Rank Model for Image Tag Completion IEEE 2016
5 Tag Based Image Search by Social Re-ranking IEEE 2016
6 Web Image Search Re-ranking with Click-based Similarity and Typicality IEEE 2016
7 A Mixed Generative Discriminative Based Hashing Method IEEE 2016
8 Semantic Concept Co-occurrence Patterns for Image Annotation and Retrieval IEEE 2016
9 An Attribute-Assisted Reranking Model for Web Image Search IEEE 2015
10 Learning to Rank Image Tags with Limited Training Examples IEEE 2015
11 Multiview Alignment Hashing for Efficient Image Search IEEE 2015
12 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems IEEE 2014
13 Personalized Geo-Specific Tag Recommendation for Photos Social websites IEEE 2014
14 Learning and Recognition of On-Premise Signs from Weakly Labeled Street View Image IEEE 2014
15 Learn to Personalized Image Search from the Photo Sharing Websites IEEE 2012
16 A Personal Authentication Based on IRIS Recognition IEEE
17 Noise Reduction By Fuzzy Image Filtering IEEE
18 Script identification through temporal Sequence of the Strokes IEEE
NETWORKING / NETWORK SECURITY / WIRELESS COMMUNICATIONS/ PARALLEL AND
DISTRIBUTED SYSTEM/ SECURE COMPUTING/ IOT 19 NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media IEEE 2017
20 Network Capability in Localizing Node Failures via End-to-End Path Measurements IEEE 2017
21 Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Network IEEE 2017
22 Routing in Accumulative Multi-Hop Networks IEEE 2017
23 A Credibility Analysis System for Assessing Information on Twitter IEEE 2017
24 FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data IEEE 2017
25 My Privacy My Decision: Control of Photo Sharing on Online Social Networks IEEE 2017
26 SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks IEEE 2017
27 Search Rank Fraud and Malware Detection in Google Play IEEE 2017
28 Towards Detecting Compromised Accounts on Social Networks IEEE 2017
29 Efficient and Privacy-preserving Polygons Spatial Query Framework for Location-based Services IEEE 2017
30 Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems IEEE 2017
31 SPFM: Scalable and Privacy-preserving Friend Matching in Mobile Cloud IEEE 2017
32 iASK: A Distributed Q&A System Incorporating Social Community and Global Collective Intelligence IEEE 2017
33 Improving Automated Bug Triaging with Specialized Topic Model (SE) IEEE 2017
34 Secure and Energy-Efficient Data Transmission System Based on Chaotic Compressive Sensing in Body-to-Body Networks
IEEE2017
35 A Shoulder Surfing Resistant Graphical Authentication System IEEE 2016
36 Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder IEEE 2016
37 FRAppE Detecting Malicious Facebook Applications IEEE 2016
38 FRoDO: Fraud Resilient Device for Off-line micro-payments IEEE 2016
39 Mitigating Cross-Site Scripting Attacks with a Content Security Policy IEEE 2016
40 STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users IEEE 2016
41 A Hop-by-Hop Routing Mechanism for Green Internet IEEE 2016
42 EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data IEEE 2016
43 Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach IEEE 2016
44 Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks IEEE 2016
45 Continuous Answering Holistic Queries over Sensor Networks IEEE 2016
46 Geometric Range Search on Encrypted Spatial Data IEEE 2016
47 Secure and Efficient Data Communication Protocol for Wireless Body Area Networks IEEE 2016
48 Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing (IOT) IEEE 2015
49 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security IEEE 2015
50 Continuous and Transparent User Identity Verification for Secure Internet Services IEEE 2015
51 Trust-based Service Management for Social Internet of Things Systems IEEE 2015
52 Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding Cryptographic Scheme and Evaluating Its Performance
IEEE 2014
53 A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis IEEE 2014
54 Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks IEEE 2014
55 A Two-Stage Deanonymization Attack Against Anonymized Social Networks IEEE 2014
56 Community-home-based Multi-copy Routing in Mobile Social Networks IEEE 2014
57 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks IEEE 2014
58 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage IEEE 2014
59 Map-Aware Models for Indoor Wireless Localization Systems IEEE 2014
60 Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices IEEE 2014
61 Secure Data Retrieval For Decentralized Disruption-Tolerant Military Networks IEEE 2014
62 CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring IEEE 2013
63 Fully Anonymous Profile Matching in Mobile Social Networks IEEE 2013
64 Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks IEEE 2013
65 Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks IEEE 2013
66 Participatory Privacy: Enabling Privacy in Participatory Sensing IEEE 2013
67 TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing IEEE 2013
68 Vampire attacks: Draining life from wireless ad-hoc sensor networks IEEE 2013
69 Online Modeling of Proactive Moderation System for Auction Fraud Detection IEEE 2012
71 Packet-Hiding Methods for Preventing Selective Jamming Attacks IEEE 2012
72 Privacy- and Integrity-Preserving Range Queries in Sensor Networks IEEE 2012
73 A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree IEEE 2011
74 A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks IEEE 2011
75 Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks IEEE 2011
76 Design and Implementation of Addressing Mental Health Epidemic among University Students via Web-based, Self-Screening and Referral System
IEEE 2011
77 Modeling and Detection of Camouflaging Worm. IEEE 2011
78 Nymble: Blocking Misbehaving Users in Anonym zing Networks IEEE 2011
79 SAT:A Security Architecture Achieving Anonymity and Traceability in Wireless IEEE 2011
80 Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks IEEE 2011
81 Achieving Network Level Privacy in Wireless Sensor Networks IEEE 2010
82 Bandwidth Recycling in IEEE 802.16 Networks IEEE 2010
83 Host-to-Host Congestion Control for TCP IEEE 2010
84 Label-Based DV-Hop Localization against Wormhole Attacks In Wireless Sensor Networks IEEE 2010
85 A Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks IEEE
86 Distributed Cache Updating Using Dynamic Source Routing Protocol IEEE
CLOUD COMPUTING
87 A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users IEEE 2017
88 A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification IEEE 2017
89 A robust reputation management mechanism in the federated cloud IEEE 2017
90 Efficient and Expressive Keyword Search Over Encrypted Data in Cloud IEEE 2017
91 Fast Phrase Search for Encrypted Cloud Storage IEEE 2017
92 Privacy-Preserving Multi keyword Similarity Search Over Outsourced Cloud Data IEEE 2017
93 RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage IEEE 2017
94 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption IEEE 2017
95 TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud IEEE 2017
96 TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud IEEE 2017
97 Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage IEEE 2017
98 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud IEEE 2016
99 Circuit Cipher text-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing IEEE 2016
100 DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments IEEE 2016
101 SecRBAC: Secure data in the Clouds IEEE 2016
102 Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming IEEE 2016
103 Attribute-Based Data Sharing Scheme Revisited in Cloud Computing IEEE 2016
104 Dynamic Hash Table Based Public Auditing for Secure Cloud Storage IEEE 2016
105 Efficient and Expressive Keyword Search Over Encrypted Data in Cloud IEEE 2016
106 Dynamic and Public Auditing with Fair Arbitration for Cloud Data IEEE 2016
107 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data IEEE 2016
108 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates IEEE 2016
109 Audit-Free Cloud Storage via Deniable Attribute-based Encryption IEEE 2015
110 Provable Multicopy Dynamic Data Possession in Cloud Computing Systems IEEE 2015
111 Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage IEEE 2015
112 Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute based Encryption IEEE 2015
113 EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service IEEE 2015
114 CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability IEEE 2015
115 Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage IEEE 2015
116 Discovery of Ranking Fraud for Mobile Apps IEEE 2015
117 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation IEEE 2015
118 Secure Distributed Deduplication Systems With Improved Reliability IEEE 2015
119 Secure Auditing and Deduplicating Data in Cloud IEEE 2015
120 T-Broker: A Trust-Aware Service Brokering Scheme For Multiple Cloud Collaborative Services IEEE 2015
121 A Cloud Environment for Backup and Data Storage IEEE 2014
122 A Hybrid Cloud Approach for Secure Authorized Deduplication IEEE 2014
123 Cloud-Assisted Mobile-Access of Health Data With Privacy and Audit ability IEEE 2014
124 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud IEEE 2014
125 VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data IEEE 2014
126 AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds IEEE 2013
127 Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment IEEE 2013
128 Privacy-Preserving Public Auditing for Secure Cloud Storage IEEE 2013
129 Cloud Computing Security: From Single to Multi-Clouds IEEE 2012
130 Ensuring Distributed Accountability For Data Sharing in The Cloud IEEE 2012
131 Secure and Practical Outsourcing of Linear Programming in Cloud Computing IEEE 2011
132 Ensuring Data Storage Security in Cloud Computing IEEE 2010
KNOWLEDGE AND DATA ENGINEERING PROJECTS/DATA MINING/WEB MINING /BIG DATA
133 Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach IEEE 2017
134 Detecting Stress Based on Social Interactions in Social Networks IEEE 2017
135 Efficient Clue-based Route Search on Road Networks IEEE 2017
136 Mining Competitors from Large Unstructured Datasets IEEE 2017
137 Efficient Keyword-aware Representative Travel Route Recommendation IEEE 2017
138 l-Injection: Toward Effective Collaborative Filtering Using Uninteresting Items IEEE 2017
139 PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks IEEE 2017
140 RAPARE: A Generic Strategy for Cold-Start Rating Prediction Problem IEEE 2017
141 Design and Development of an Intelligent Web Application for Direct Consumer to Consumer Trading over Internet
IEEE 2017
142 A Rating Approach based on Sentiment Analysis IEEE 2017
143 Applying Data Mining Techniques in Cyber Crimes IEEE 2017
144 Predicting Political Mood Tendencies based on Twitter Data IEEE 2017
145 Extraction of Action Rules for Chronic Kidney Disease using Naïve Bayes Classifier IEEE 2017
146 A Novel Recommendation Model Regularized with User Trust and Item Ratings IEEE 2016
147 Connecting Social Media to E-Commerce: Cold-Start Product Recommendation using Microblogging Information IEEE 2016
148 Sentiment Embedding’s with Applications to Sentiment Analysis IEEE 2016
149 Rating Prediction based on Social Sentiment from Textual Reviews IEEE 2016
151 Personalized Travel Sequence Recommendation on Multi-Source Big Social Media IEEE 2016
152 Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks IEEE 2016
153 Resolving Multi-party Privacy Conflicts in Social Media IEEE 2016
154 Booster in High Dimensional Data Classification IEEE 2016
155 Domain-Sensitive Recommendation with User-Item Subgroup Analysis IEEE 2016
156 Nearest Keyword Set Search in Multi-Dimensional Datasets IEEE 2016
157 Quantifying Political Leaning from Tweets, Retweets, and Re tweeters IEEE 2016
158 Top-Down XML Keyword Query Processing IEEE 2016
159 User-Service Rating Prediction by Exploring Social Users’ Rating Behaviors IEEE 2016
160 Profiling Online Social Behaviors for Compromised Account Detection IEEE 2016
161 Best Keyword Cover Search IEEE 2015
162 Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model IEEE 2015
163 Domain-Specific Key phrase Extraction and Near-Duplicate Article Detection based on Ontology IEEE 2015
164 Framework For Surveillance of Instant Messages in Instant Messengers IEEE 2015
165 THE SAFE MINER: A Fine Grained Aspect Level Approach for Resolving the Sentiment IEEE 2015
166 SmartCrawler: A Two-Stage Crawler For Efficiently Harvesting Deep-Web Interfaces IEEE 2015
167 Structured Learning from Heterogeneous Behavior for Social Identity Linkage IEEE 2015
168 Trust-based Service Management for Social Internet of Things Systems IEEE 2015
169 Dealing With Concept Drifts in Process Mining IEEE 2014
170 Personalized Recommendation Combining User Interest and Social Circle IEEE 2014
171 Personalized Web search Using Browsing History And Domain Knowledge IEEE 2014
172 Privacy Preserving and Content Protecting Location based Queries IEEE 2014
173 Supporting Privacy Protection in Personalized Web Search IEEE 2014
174 A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data IEEE 2013
175 A System to Filter Unwanted Messages from OSN Uses Walls IEEE 2013
176 Anomaly Detection via Online Oversampling Principal Component Analysis. IEEE 2013
177 Multiparty Access Control for Online Social Networks: Model and Mechanisms IEEE 2013
178 Ranking Model Adaptation For Domain-Specific Search IEEE 2012
179 Extended XML Tree Pattern Matching: Theories and Algorithms IEEE 2011
180 Ranking Spatial Data by Quality Preferences IEEE 2011
MOBILE COMPUTING / ANDROID APP
181 Catch Me If You Can Evaluating Android Anti Malware Against Transformation Attacks
182 Android Based Voting System
183 Restaurant Table Order Management System
184 Tollgate payment System
185 Insurance and Banking Notifier
186 I-Student
187 Real Estate Investing Property Management
188 Online shopping Android Application
189 Android Attack Application
190 Android Event Scheduler /Reminder Application
191 Android Student Result Analyzing System
192 Insurance in android
193 M-banking
194 Mobile Invoice (Mobile Billing)
195 Mobile Location Alarm
196 Mobi Travel Guide – Smart way to travel
197 Remote PC Administration Using J2ME
198 SIP – Session Initiation Protocol (M-Conference)
199 VAS for Hand Held Device-MM7 Protocol implementation
200 Wedjat: A Mobile Phone Based Medicine In-take Reminder and Monitor S/B
WEB APPLICATIONS PROJECTS (J2EE) (JSP, JDBC, MYSQL & ORACLE)
201 108 - Public Health Emergency Services
202 Aadhaar Secure Travel Identity
203 Appositeness Intendance (Health Card)
204 Secured Integration Of Blood Bank Management
205 Company Information Tracking System (CITS)
206 Complaint Management system
207 Corporate Recruitment System (CRS)
208 DCMS (Distributed channel management system)
209 Disposition Prospectus (Government Schemes Management System)
210 E Transaction Interface (Payment Gate way for all banks)
211 Farmers Buddy
212 Bug Tracking System J2ee Application Project
213 Loan Monitoring System
214 Local Service Center
215 Medi Tracker
216 Monitoring Online Tests through Data Visualization
217 Mortal Policy Outline (insurance company)
218 Movie Rating And Review Summarization
219 Movie Rental
220 Online Crime File Management System
221 Cartel Communique ( multi-conference)
222 Collaborative White Board
223 Concurrent Train Simulation Core Java Project
224 Online Mental Health Screenings System
225 Online Registration For Voter Card
226 Online Tourism
227 Online travel and personal package Recommendation
228 Online University
229 Payroll Management system
230 Real estate Investing Property Management
231 Training And Placement System
232 Value added sales tax information system
233 Vehicle Management and Booking System
234 Virtual office Management
235 Electorate Conspiracy (Automated e-Govt Certificates)
236 Embedding the Secure Data In An Audio/Video and Image Files
237 E-Zest (resort management)
238 Global Tracker
239 Hostel Management System
240 Hotel food order system
241 Intrusion Detection System
242 Library Management System (Core Java(Swings) &MySQL)
243 Medical Store Management System
244 Orkut Using Java
245 Payroll Accounting System (Core Java(Swings) &MySQL)
246 Secure Data Transmission
247 Student Management System (Core Java(Swings) &MySQL)
248 Tanrox Work Force (Activity Control System)
249 Telecom Inventory Management System
250 Text Editor
251 Airline Reservation System
252 ATM Management System
253 Automatic DB Schema Generation
254 Automatic Number Plate Recognization
PHP APPLICATION BASED PROJECTS (PHP & MYSQL)- BCA/MCA STUDENTS 255 Avoid Food Wastage_PHP
256 Blood Bank Management
257 Complain Management System_PHP
258 Courier Management System_PHP
259 Facebook App_PHP
260 Hospital Management
261 Intranet Mailing System_PHP
262 Job portal system
263 Leave Management For MNC
264 Online Bidding_PHP
265 Online Book Shop.Com_PHP
266 Online home appliance_PHP
267 Online Notice Board_PHP
268 Online Polling For Publishers And Brands
269 Online Shopping_PHP
270 Online Tour(My Tour)
271 Pharmacy Management System
272 Real estate Investing Property Management
273 Secure File Downloading System
274 Statistical Entity Extraction from Web_PHP
275 Student Information System_PHP
276 Web Based Learning System
277 Web Doctor
Head Office: No.1 Rated company in Bangalore for all
software courses and Final Year Projects IGeekS Technologies No:19, MN Complex, 2nd Cross, Sampige Main Road, Malleswaram, Bangalore Karnataka (560003) India. Above HOP Salon, Opp. Joyalukkas, Malleswaram, Land mark : Near to Mantri Mall, Malleswaram Bangalore. Email: [email protected] ,
Office Phone: 7019280372 /9590544567 / 9739066172 Contact Person: Mr. Nandu Y, Director-Projects, Mobile: 9590544567, E-mail: [email protected] [email protected]
Partners Address:
RAJAJINAGAR: JAYANAGAR:
#531, 63rd Cross, 12th Main, after sevabhai hospital, 5th Block, Rajajinagar, Bangalore-10. Landmark: Near bashyam circle.
No 346/17, Manandi Court, 3rd Floor, 27th Cross, Jayanagar 3rd Block East, Bangalore - 560011, Near BDA Complex.
More than 12 years’ experience in IEEE Final Year Project Center, IGEEKS Technologies Supports you
in Java, Dotnet, Image Processing, Embedded, VLSI, MATLAB, Power Electronics, Power System
Technologies.
For Titles and Abstracts visit our website www.makefinalyearproject.com
For HPE COC Training Programmes
Please visit our website:
www.makefinalyearproject.com/HPE-Training.htm